In the previous section we discussed an important role of snapshot,snapshot as a backup of instance.If the instance is damaged, it can be restored by snapshot, which is Rebuild.Rebuild will replace the instance current image file with snapshot, while maintaining the rest of the instance, such as the network, and the resource-allocation attribute unchanged.Here is the flowchart of Rebuild instance
Send a request to NOVA-API
Nova-api sending messages
Nova-compute Performing action
;float:none; "/>after Rebuild, the GUI shows that instance has used the new image650) this.width=650; "Title=" http://7xo6kd.com1.z0.glb.clouddn.com/ Upload-ueditor-image-20160522-1463901457760078312.png "src=" http://7xo6kd.com1.z0.glb.clouddn.com/ Upload-ueditor-image-20160522-1463901713811043680.jpg "style=" border:0px;white-space:normal;float:none; "/>The above is the analysis of Rebuild operation, the next section we discuss the Shelve operation.650) this.width=650; "title=" "src=" http://7
/etc/keystone/keystone.conf650) this.width=650; "title=" "src=" http://7xo6kd.com1.z0.glb.clouddn.com/ Upload-ueditor-image-20160410-1460244060474022892.jpg "style=" Border:0px;vertical-align:middle;color:rgb ( 63,63,63); font-family: ' Microsoft Yahei '; Font-size:15px;line-height:21.75px;text-align:justify;white-space: Normal;background-color:rgb (246,246,246); "/>In a non-devstack installation, the log may be in the/var/log/keystone/directory.Keystone is here, the next section we begin to lea
clientsNova-consoleauthResponsible for providing Token authentication to the Access virtual machine consoleNova-certProvide X509 certificate supportDatabaseNova will have some data to store in the database, generally using MySQL. The database is installed on the control node. Nova uses a database named "Nova".Message QueueBefore we learned that Nova contains a multitude of sub-services that need to coordinate and communicate with each other. To decouple each sub-service, Nova passes the message
ctrl+a+n)ctrl+a+0..9 Switch to Window 0..9Ctrl+a+d temporarily disconnects (detach) the current screen session without interrupting the program's operationExecuting in the shellScreen-ls List all current sessionScreen-r stack back to devstack this sessionDelete an automatically created networkDevstack may create several test networks at deployment time, in order to get a clean environment that needs to be removedDelete Router admin->system->routersDelete Network Admin->system->networksSo far, w
-ueditor-image-20160404-1459724662268078986.png "title=" "style=" Border:none;color:rgb (51,51,51); font-family: ' Microsoft Yahei '; Font-size:14px;line-height:26px;white-space:normal;background-color:rgb ( 255,255,255); "/>Three networks are planned on the network:
Management Network: Used for OpenStack internal management, such as communication between services. Use eth0 here
VM (Tenant) Network:openstack The network that is used by the virtual machines that are deployed. OpenStack supp
driver for Linux Bridge and open Vswitch is to configure the virtual switches on each node. The type supported by Linux Bridge driver includes local, flat, VLAN, and Vxlan. Open Vswitch Driver supports GRE in addition to these 4 types.L2 population driver function is to optimize and limit the broadcast traffic in the overlay network. Both Vxlan and GRE belong to the overlay network.ML2 Core plugin has become the preferred plugin for OpenStack Neutron, and later in this tutorial we'll discuss ho
cirros-vm2 in the same way, assigning the IP to 172.16.100.4.650) this.width=650; "Src=" http://7xo6kd.com1.z0.glb.clouddn.com/ Upload-ueditor-image-20161113-1479026489473056264.jpg "/>The CIRROS-VM2 is schedule to the compute node, the corresponding tap device is TAP457CC048-AA, and connected to bridge brq1762d312-d4.650) this.width=650; "Src=" http://7xo6kd.com1.z0.glb.clouddn.com/ Upload-ueditor-image-20161113-1479026489603043136.jpg "/>Because there is no HDCP service on the compute nodes,
configure firewall policy on router to provide network security protection.Another safety-related feature is the security Group, which is also implemented through IPtables. The difference between Firewall and Security Group is that:
The Firewall security policy is located in router, which protects all network of a project.
Security Group Safety Policy is located in instance and is protected by a single instance.
Firewall and Security Group will be analyzed in detail later.Load
Opendaylight, VMWare NSX, and more.Physical switch basedIncludes Cisco Nexus, Arista, Mellanox, and more. For example, in the previous example, if you switch to Cisco's mechanism driver, you will add vlan100 on the specified trunk port of the Cisco physical switch.The mechanism driver discussed in this tutorial will cover Linux bridge, open vswitch and L2 population.The role of ML2 mechanism driver for Linux Bridge and open Vswitch is to configure the virtual switches on each node. The type sup
administrator. But if you're an OpenStack operations and Management officer, the logs are very important to you. Since OpenStack operations are error-prone, the error messages given on the GUI are very general and concise, and the logs provide a lot of clues, especially when the debug option is turned on. If you are in the learning phase of OpenStack, as we are now, it is highly recommended that you look at the logs too. Logs can help you gain a deeper understanding of how OpenStack works.
Lo
messages
Nova-compute Performing actions
1, 22 steps are performed on the control node to view the log of the NOVA-API. The 3rd step is performed on the compute nodes, viewing the logs of the Nova-compute.650) this.width=650; "title=" "src=" http://7xo6kd.com1.z0.glb.clouddn.com/ Upload-ueditor-image-20160505-1462406117920043007.jpg "style=" Border:0px;vertical-align:middle;color:rgb ( 63,63,63); font-family: ' Microsoft Yahei '; Font-size:15px;line-height:21.75px;text-align:justify;ba
-1463039866218002906.jpg "style=" border:0px;white-space:normal;float:none; "/> The above is a detailed analysis of terminate, the next section we continue to analyze pause/resume operations. 650) this.width=650; "title=" "src=" http://7xo6kd.com1.z0.glb.clouddn.com/ Upload-ueditor-image-20160512-1463039866309045554.jpg "style=" Border:0px;vertical-align:middle;color:rgb ( 63,63,63); font-family: ' Microsoft Yahei '; Font-size:15px;line-height:21.75px;text-align:justify;white-space: Normal;backg
This section analyzes the instance start operation in detail through a log file.here is the flowchart for start instance
Send a request to NOVA-API
Nova-api sending messages
Nova-compute Performing actions
Let's discuss each step in detail below.send a request to Nova-apiThe customer (which can be an OpenStack end-user or other program) sends a request to the API (NOVA-API): "Start this Instance for me"View Log/opt/stack/logs/n-api.logNova-api sending MessagesNova-api sent
Volume via DD.Log analysis no longer repeat, leave a everyone to practice.If a volume exists snapshot, then this volume cannot be deleted.This is because snapshot relies on volume,snapshot not being able to exist independently.In an environment where LVM is a volume provider, snapshot is completely copy from the source volume, so this dependency is not strong.But in other volume provider (such as commercial storage devices or Distributed file systems), snapshot is usually a reference (pointer)
-space:normal;float:none; "/>resume operations is reserved for everyone to practice. Tip: The Resume operation here is actually a unpause operation, which can be used to locate the log through the keyword "unpause". The above is a detailed analysis of Pause/resume, the next section we continue to analyze suspend/resume operations. 650) this.width=650; "title=" "src=" http://7xo6kd.com1.z0.glb.clouddn.com/ Upload-ueditor-image-20160516-1463348250019020727.jpg "style=" Border:0px;vertical-align:mi
In the previous section we discussed the first part of Cinder creating Volume, Cinder-api operation, this section continues the second part, Cinder-scheduler scheduling work.cinder-scheduler Execution SchedulingCinder-scheduler executes the scheduling algorithm and selects the optimal storage node log for/opt/stack/logs/c-sch.log through Filter and Weigher.Cinder-scheduler performs the dispatch work through Flow Volume_create_scheduler.The Flow executes Extractschedulerspectask and schedulecreat
complete, we can view the contents of the container directoryThere are three files, according to the previous log we can know:
BACKUP-00001, compressed backup file.
Backup_metadata,metadata file.
Backup_sha256file, encrypt files.
You can view the current backup by Cinder Backup-list.In addition we can check the usage of cinder backup-create.Here is the –incremental option, which means you can perform an incremental backup.If you have done normal (full-volume) backups befor
in its own configuration file/etc/cinder/cinder.conf, which is named for the volume Provider of the storage node.This allows the Capabilitiesfilter to filter out the specified Volume Provider through the "Volume_backend_name" of the Volume Type.Different storage nodes can be configured with the same volume_backend_name in their respective cinder.conf, which is allowed. Because although the storage nodes are different, they may be using a Volume Provider.If multiple storage nodes are selected in
Storage Pool of LVM type Not only can a file be assigned to the client as a virtual disk, but the LV in the VG on the host can also be allocated to the virtual machine for use as a virtual disk.However, LV because there is no MBR boot record of the disk, can not be used as the boot disk of the virtual machine, only as a data disk.In this configuration, the VG on the host is a Storage POOL,VG in the LV is Volume. The advantages of LV are better performance, the lack of management and mobility is
The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion;
products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the
content of the page makes you feel confusing, please write us an email, we will handle the problem
within 5 days after receiving your email.
If you find any instances of plagiarism from the community, please send an email to:
info-contact@alibabacloud.com
and provide relevant evidence. A staff member will contact you within 5 working days.